Which cable called roll-over?
No Answer is Posted For this Question
Be the First to Post Answer
Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments
Mention what does data packets consist of?
Explain usage of ICMP in IP routing
1.i have to pcs in the network 192.168.1.1 202.55.88.16 2. if that fails shud go through 122.16.1.3 and and if that comes back active it shud go through 202.55.88.16 itself
hi friend i hav difficulty n need to solve it...v need to implement a new raw switch in company as to increase the no of staff...snc raw switch by default is in server mode,i wanna know 1.how to make a switch in client mode...2.how to configure switch i mean to sy how to connect all switches to network.
Identify the order of the 5 step encapsulation? 1. Create the segment 2. Convert the frame to bits 3. Create the packet 4. Create the frame 5. User creates the data A.) 1,2,4,2,5 B.) 2,1,3,4,5 C.) 5,1,3,4,2 D.) 5,3,4,1,2
What is osi?
Assuming no subnetting, which two pieces of information can be derived from the IP address 144.132.25.10? (Choose two) A. It is a Class C address B. It is a Class B address C. The network address is 144.0.0.0 D. The network address is 144.132.25.0 E. The host spoon of the address is 25.10
Which OSI layer incorporates the MAC address and the LLC? A.) Data link B.) Network C.) Physcial D.) Transport
Which type of transmission bus topology support?
You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use? A. 0.0.15.255 B. 0.0.255.255 C. 0.0.31.255 D. 0.0.127.255 E. 0.0.255.255
When using TCP, after a session is open, the applications can adjust the amount of segments they receive before sending an acknowledgment. This behaviour is known as ______________. FCS Windowing MTU adjustment Flexible Send Path